The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an investigation of information security techniques in medical imaging, focusing on security goals. Encrypting a message before hiding them gives an extra layer of security, and thus, will provide an excellent solution to protect the sensitive information of patients during the sharing of medical information. Medical image steganography is a special case of image steganography, while Digital Imaging and Communications in Medicine (DICOM) is the backbone of all medical imaging divisions, whereby it is most broadly used to store and transmit medical images. The main objective of this study is to provide a general idea of what Least Significant Bit-based (LSB) steganography techniques have achieved in medical images.
Abstract
The model of financial reporting in Iraq Based on a specific set of accounting objectives & concepts, which require the application of the historical cost valuation approach due to the nature of the objectives of financial reporting in Iraq, established under the unified accounting system , which focuses on serving the needs of the state because it the most influential user in setting accounting objectives and concepts, which stems mainly from the nature of the economic system in Iraq, which focuses on the public sector versus the private sector as well as the nature of the ownership business that focuses on partnership versus corpor
... Show MoreIn today's cities, it is easy to see large numbers of vacant lands and unused abandoned sites in downtown areas that are not only ugly but also potentially becoming fertile ground for criminal activities that endanger residents and visitors and contribute to the further degradation of neighborhoods,
can provide reuse of spaces Neglected opportunities to reshape the appearance of the city and to improve the city center for its users that the presence of many neglected sites, whether they were abandoned buildings or sites for destroyed buildings in Mosul after the war on ISIS and with large areas amid the urban fabric led to the emergence of the research problem is (lack of urban planning to reactivate abandoned sites within the ci
... Show MoreThe main objective of the audit is The asset is maintained and operated efficiently and is done through to detect fraud and errors in the financial statements and to verify the accuracy and accuracy of the information contained therein and to give a neutral technical opinion on the basis of that, thus the auditor has a professional responsibility in achieving this goal, and that the effects of issuing a wrong opinion works on The loading of the beneficiaries is significant damage, And therefore the presence of any error or bias of the auditor when taking personal judgments in relation to the determination of the relative importance and the selection of audit samples and determine the adequacy and validity of evidence and implemen
... Show MoreTechnical education in Iraq Composed of, a complex system of technical competence and scientific, technical and administrative, which extends to cover large areas of the country and constitute a vicious circle between economic development, social and cultural rights through middle-management on the one hand, and between academic knowledge and political decision-making, which aims to bring such development On the other hand, in the light of that education is the actual technical extension applied to create the idea of complementarily between them. In Iraq, have been distributed institutes and technical colleges to achieve those goals, in addition to realizing the idea of integration between them and community, and integration of t
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Natural fractures provide an important reservoir space and migration channels for oil and gas reservoirs and control the reservoir potential. Therefore, it is essential to understand the methods for identifying accurate reservoir permeability and characterizing reservoir fractures. In particular, using conventional measurements to identify permeability and characterize fractures is very expensive. While using conventional logging data is very challenging, and an efficient characterization correlation method is urgently needed. In this paper, we have evaluated reservoir potential based on the sensitivity of sonic scanner tools to fluid mobility, maximum stress direction, and fractures presence. This tool provides a continuous estimat
... Show MoreCost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show More